Metasploit is one of the best-known and most used cybersecurity technologies for penetration testing (Cyber Security News). This short course gives you the job-ready skills in exploitation techniques and penetration testing using Metasploit employers are looking for.


Exploitation and Penetration Testing with Metasploit
1,693 人已注册
包含在 中
您将学到什么
Build job-ready skills using the Metasploit framework, its architecture, and capabilities, to effectively support penetration testing activities.
Perform reconnaissance, vulnerability assessment, exploit execution, and post-exploitation tasks using Metasploit.
Develop, modify, and execute exploits for real-world attack scenarios, including network, web application, and social engineering.
Document penetration testing findings, generate actionable reports, and provide recommendations for security improvements.
您将获得的技能
要了解的详细信息

添加到您的领英档案
June 2025
14 项作业
了解顶级公司的员工如何掌握热门技能

积累 Security 领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 通过 IBM 获得可共享的职业证书

该课程共有5个模块
In this module, you'll be introduced to the Metasploit Framework, covering its installation, interface, and the foundational concepts of exploitation. You'll learn how to set up Metasploit, identify key components like payloads and sessions, and perform basic exploitation tasks in a safe environment.
涵盖的内容
6个视频5篇阅读材料3个作业7个插件
In this module, you'll build on your foundational knowledge as you explore auxiliary modules, session handling, and the basics of exploit development. You'll simulate attacks, modify existing exploits, and apply fuzzing techniques to discover vulnerabilities, bridging theory with real-world offensive security tasks.
涵盖的内容
3个视频2篇阅读材料3个作业7个插件
In this module, you will explore techniques attackers use after compromising a system, including privilege escalation, persistence mechanisms, evasion techniques, and network attack simulations.
涵盖的内容
6个视频3篇阅读材料4个作业6个插件
In this module, you'll explore exploitation techniques that target web applications and human vulnerabilities. You'll learn how attackers compromise web apps, use phishing, and perform physical and USB-based attacks.
涵盖的内容
6个视频3篇阅读材料4个作业5个插件
This module serves as the capstone for the course, where learners will apply all acquired skills to conduct a comprehensive penetration test using Metasploit.
涵盖的内容
1个视频2篇阅读材料1个应用程序项目3个插件
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
提供方
从 Security 浏览更多内容
Coursera Project Network
- 状态:免费试用
- 状态:免费试用
人们为什么选择 Coursera 来帮助自己实现职业发展




常见问题
Yes, Metasploit is one of the most popular and powerful tools for penetration testing and ethical hacking. It’s used by cybersecurity professionals across industries to identify and exploit vulnerabilities in systems—making it a key tool for real-world offensive security testing.
Absolutely. Metasploit is considered a core skill for many cybersecurity roles, especially in penetration testing, red teaming, and vulnerability assessment. Knowing how to use Metasploit demonstrates that you have hands-on experience with the tools and techniques professionals rely on in the field.
Basic knowledge of networking, operating systems (especially Linux), and cybersecurity concepts is helpful, but you don’t need to be an expert to get started. This course is designed to guide you through the essentials of Metasploit, from installation to real-world applications.
更多问题
提供助学金,